1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
3 years ago
9

What is something about online conferencing that you understand better now. What did you learn?

Computers and Technology
1 answer:
Mazyrski [523]3 years ago
4 0

Answer:

man this question is really about your personal experience but i'll try my best to answer this

Explanation:

onnline Web Conferencing is used by businesses and now schools who went to online because of the virus. for businesses i learned they use it to present and share with online collaboration on different applications including documents, web sites, data files, video, emails, and reduce the time and cost of business travel for meetings. i understand now that online conferencing can be used for Applications for web conferencing include meetings, training events, lectures, or presentations from a web-connected computer to other web-connected computers.

You might be interested in
Which method finds the greatest common divisor of 14 and 35?
Liula [17]

Answer:

gcd method

Explanation:

Given

The code snippet

Required

Which method completes the code

To return the gcd of numbers, simply use the gcd method.

So: the complete code is;

<em>import math</em>

<em>math.gcd(14,35)</em>

6 0
3 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
4 years ago
\What will the weather most likely be like the day after a warm front? (4 points) The temperature will be cool or cold, and ther
poizon [28]

The temperature will be warm, and there will be no rain.

5 0
3 years ago
Read 2 more answers
P36. In Section 3.5.4, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why
KatRina [158]

Answer:

The Packets can be arrived out of an order from the Internet Protocol layer.  

So, whenever the out of an order packets would be received then, it would be generated the duplicate ACK's, if we perform the re-transmission after the first duplicate ACK would be lead the senders to introduced too many redundant packets in the networks.

Explanation:

  • All the bytes, in the Transmission Control Protocol connections, are the numbered, from the beginning at the randomly choose the initial sequence number (ISN).  
  • The SYN packets consumes the one sequence number, so the data will be actual and it begins at the ISN+1.  
  • The receivers ack's sequences the number x acknowledged the receipts of all the data bytes that is less than byte the number x.
7 0
3 years ago
A database program helps to ____________.
Juliette [100K]
D. A database is software which is designed to store massive amounts of data and organize them in such a way that information can easily be worked on (added, deleted, moved, etc...).
8 0
3 years ago
Read 2 more answers
Other questions:
  • As of 2012, Twitter has approximately how many members?
    10·1 answer
  • A software architecture that divides an application into view, business logic, and data is called a(n) ________.â
    14·1 answer
  • Which of the following is NOT true about variables?
    13·1 answer
  • Discuss at least two challenges students face when conducting research on the Internet.
    7·2 answers
  • What is the main difference between a fileserver and network attached storage (NAS)?
    10·1 answer
  • List two ways to insert a chart in powerpoint
    14·1 answer
  • Which describes a set amount of pay received by a worker over the course of a year?
    6·2 answers
  • Cách soạn thảo văn bản trên word
    7·1 answer
  • Area Triangolo Rettangolo in c++
    6·1 answer
  • Why when I send a message on iOS it says the person’s notification is silenced, and the message isn’t delivered?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!